Hi [[ session.user.profile.firstName ]]
Sort by:
    • SSL Best Practices: Keys, Certificates and Advanced Certificates
      SSL Best Practices: Keys, Certificates and Advanced Certificates Mark Giannotti Recorded: Jun 9 2017 3:50 pm UTC 66 mins
    • SSL certificates secure ecommerce, communications and private information passed from browser to Web server and between servers. Join us for a complimentary webinar that covers key best practices for securely deploying SSL certificates for your specific environment. We will discuss:

      - Private Keys for Quality Protection: Learn how to use private keys, a key factor in determining the quality of protection provided by SSL.
      - Cater SSL For Your Environment: Discuss importance of selecting the appropriate Certification Authority (CA) and certificate type.
      - Troubleshoot Your SSL Problems: Explore how advanced certificates can be used to help solve problems in your SSL applications.

      Read more >
    • The Evolution of SSL/TLS and Browser Compliance Requirements in 2017
      The Evolution of SSL/TLS and Browser Compliance Requirements in 2017 Dathan Demone, Entrust Datacard Recorded: Jun 21 2017 3:00 pm UTC 57 mins
    • SSL/TLS Industry requirements are changing at an unprecedented pace. Over the last couple of years, new requirements have been passed down by the CA and browser community to help further solidify the security practices around obtaining and using SSL/TLS and other types of publicly trusted certificates. Over the next 12 months, more important changes are being introduced to continue that trend. Join Dathan Demone, Product Manager at Entrust Datacard, who will discuss both past and future changes that will have a major impact on all certificate subscribers. In this Webinar, we will discuss topics such as:

      • New changes coming to browsers and how they notify end users about the proper use of SSL/TLS on all web pages
      • Changes to certificate lifetime policies and verification rules that are being introduced in 2017
      • New requirements around Certificate Transparency that are being introduced in October, 2017
      • Updates to recommended security best practices and new vulnerabilities in the world of SSL/TLS
      • Certificate Authority Authorization and how this can be used to protect your organization against fraud

      Read more >
    • Why You Need SSL/TLS Visibility
      Why You Need SSL/TLS Visibility Danny Luedke, Product Marketing Manager Recorded: Aug 18 2017 7:00 pm UTC 52 mins
    • As SSL becomes the de facto standard for all Internet traffic, network security solutions are going blind. Cyber criminals are leveraging encryption to their advantage ‘phoning-home’ to SSL/TLS websites, knowingly bypassing traditional security solutions that don’t decrypt and inspect their traffic.

      In a recent IDC study commissioned by F5, 90% of respondents cited significant concern over the ability to inspect encrypted traffic and 85% say outbound encrypted traffic will increase significantly and negatively impact their security strategies over the next 2 years.

      View this on demand webinar to learn more about:
      •The rise of SSL traffic and the risks to your business
      •How to gain visibility into your SSL/TLS traffic
      •How F5 addresses performance concerns
      •How F5 solutions easily integrate with other industry leading security solutions

      Read more >
    • The Evolution of SSL/TLS and Browser Compliance Requirements in 2017
      The Evolution of SSL/TLS and Browser Compliance Requirements in 2017 Dathan Demone, Entrust Datacard Recorded: Jul 25 2017 11:00 pm UTC 57 mins
    • SSL/TLS Industry requirements are changing at an unprecedented pace. Over the last couple of years, new requirements have been passed down by the CA and browser community to help further solidify the security practices around obtaining and using SSL/TLS and other types of publicly trusted certificates. Over the next 12 months, more important changes are being introduced to continue that trend. Join Dathan Demone, Product Manager at Entrust Datacard, who will discuss both past and future changes that will have a major impact on all certificate subscribers. In this Webinar, we will discuss topics such as:

      • New changes coming to browsers and how they notify end users about the proper use of SSL/TLS on all web pages
      • Changes to certificate lifetime policies and verification rules that are being introduced in 2017
      • New requirements around Certificate Transparency that are being introduced in October, 2017
      • Updates to recommended security best practices and new vulnerabilities in the world of SSL/TLS
      • Certificate Authority Authorization and how this can be used to protect your organization against fraud

      Read more >
    • SSL Best Practices: Server Configuration & Enhanced Security
      SSL Best Practices: Server Configuration & Enhanced Security Mark Giannotii, Entrust Recorded: Jun 28 2017 5:55 pm UTC 61 mins
    • The best way to mitigate security vulnerabilities on your web server is to configure that server in the most reliable way. Join us for our SSL Best Practices webinar and learn to stop threats from the start. This complimentary webinar will explore server configuration and server enhancement. We will discuss how secure server configuration for SSL protects your sites from online threats and:

      •Implement the Proper Configuration: Learn which SSL server configuration options mitigate against known problems
      •Enhanced Security Features: Discuss enhanced security features and the benefits they provide
      •Tools For Configuration: Get a demonstration of available services that will help administrators assess the security configuration of their SSL web server

      Read more >
    • SSL Best Practices: Keys, Certificates and Advanced Certificates
      SSL Best Practices: Keys, Certificates and Advanced Certificates Mark Giannotii, Entrust Recorded: Jun 28 2017 6:00 pm UTC 66 mins
    • Phishing attacks are dangerous to your customers and could be detrimental to your brand. Securing your website and protecting your business are the cornerstone of Entrust SSL Best Practices. Join us for a complimentary webinar that covers key best practices for protecting your domain phishing attacks against the customer’s clientele and unsuspecting internet users.

      We will discuss:

      •The Definition of a Trusted CA: Learn what controls a trusted Certificate Authority (CA) has in place to ensure that unauthorized administrator cannot acquire a certificate for your organization’s brand name.
      •Domain Protection: Discuss how you can prevent another CA from issuing certificates for your domain and detect previously issued certificates.
      •Domain and Brand Reputation: Explore subjects such as certificate aSSL certificates secure ecommerce, communications and private information passed from browser to Web server and between servers. Join us for a complimentary webinar that covers key best practices for securely deploying SSL certificates for your specific environment. We will discuss:
      •Private Keys for Quality Protection: Learn how to use private keys, a key factor in determining the quality of protection provided by SSL.
      •Cater SSL For Your Environment: Discuss importance of selecting the appropriate Certification Authority (CA) and certificate type.
      •Troubleshoot Your SSL Problems: Explore how advanced certificates can be used to help solve problems in your SSL applications.
      transparency, Microsoft’s certificate reputation, HTTP public key pinning and certification authority authorization.

      Read more >
    • SSL Best Practices: Domain Protection
      SSL Best Practices: Domain Protection Mark Giannotii, Entrust Recorded: Jun 28 2017 5:55 pm UTC 56 mins
    • Phishing attacks are dangerous to your customers and could be detrimental to your brand. Securing your website and protecting your business are the cornerstone of Entrust SSL Best Practices. Join us for a complimentary webinar that covers key best practices for protecting your domain phishing attacks against the customer’s clientele and unsuspecting internet users.

      We will discuss:

      •The Definition of a Trusted CA: Learn what controls a trusted Certificate Authority (CA) has in place to ensure that unauthorized administrator cannot acquire a certificate for your organization’s brand name.
      •Domain Protection: Discuss how you can prevent another CA from issuing certificates for your domain and detect previously issued certificates.
      •Domain and Brand Reputation: Explore subjects such as certificate transparency, Microsoft’s certificate reputation, HTTP public key pinning and certification authority authorization.

      Read more >
    • Regain control of your SSL Environment
      Regain control of your SSL Environment Alan Goh & Helen Lew Recorded: Feb 16 2017 4:00 am UTC 26 mins
    • With numerous certificates sited across multiple locations and geographies, ensuring continuity and compliance has become a time-consuming, costly, and risky business for enterprises. In this 30-45 minute webinar you'll learn how Symantec Discovery can help to ensure continuity and compliance, and deliver peace of mind when it comes to your SSL/TLS certificate real estate.

      - Discover your entire certificate infrastructure
      - Instantly assess every certificate for security risks
      - Reduce your risk of being non-compliant
      - Learn about our free trial

      Read more >
    • Neue Hybrid-SSL-Zertifikate mit ECC und RSA
      Neue Hybrid-SSL-Zertifikate mit ECC und RSA Tobias Zatti, Systems Engineer Recorded: Nov 19 2015 11:00 am UTC 25 mins
    • ECC ist der modernste Verschlüsselungsalgorithmus, der beim Schlüsselaustausch und der Authentifizierung mit den Protokollen SSL und TLS zum Einsatz kommt.
      ECC wird RSA voraussichtlich ablösen, da der explosionsartige Anstieg der Mobilgerätenutzung und der Kommunikation zwischen Maschinen (M2M) sowie die Entwicklung des Internet der Dinge die Grenzen der Skalierbarkeit des derzeitigen Standardalgorithmus RSA übersteigen.

      Die Zuverlässigkeit und Leistung von ECC sind inzwischen klar erwiesen. Die größte Hürde für den Einsatz des Algorithmus ist mangelnde Kompatibilität mit vorhandener Technik. Deshalb hat Symantec Hybrid-SSL-Zertifikate mit ECC und RSA entwickelt. Mit diesen Zertifikaten können Sie Ihre bisherigen Infrastrukturinvestitionen weiterhin nutzen und gleichzeitig Kompatibilitätsprobleme vermeiden.

      In diesem Webcast erfahren Sie,

      welche Vorteile ECC in puncto Sicherheit, Zuverlässigkeit und Kapazität bietet,
      wie die Zertifikatskette eines Hybrid-SSL-Zertifikats mit ECC und RSA aussieht und
      wie Sie ein solches Zertifikat beantragen.

      Read more >
    • Introducing ECC/RSA hybrid SSL Certificates
      Introducing ECC/RSA hybrid SSL Certificates Dave Corbett - Senior Systems Engineer Recorded: Nov 3 2015 11:00 am UTC 28 mins
    • ECC is the latest encryption algorithm used for key exchange and authentication purposes in the SSL/TLS protocols.
      ECC is expected to replace RSA (current standard) as the scalability of RSA has become too limited to deal with the explosion of the number of mobile devices, machine-to-machine (M2M) communications and the development of the IoT (internet of the things).

      The reliability and performance of ECC no longer needs to be demonstrated. However, a significant obstacle to the adoption of ECC lies on the lack of compatibility for such algorithm. This is why we have created ECC/RSA hybrid SSL certificates, allowing you to protect your current infrastructure investment while mitigating potential compatibility issues at the same time.

      Join us in this webcast and find out:

      -what are the main benefits of ECC in terms of strength, reliability and capacity
      -how ECC/RSA hybrid certificate chains work
      -what is the enrolment process

      Read more >
    • Optimize SSL Certificate Management with Symantec and A10 Networks
      Optimize SSL Certificate Management with Symantec and A10 Networks Frank Agurto-Machado, Pre-Sales Engineer, Symantec; John Gudmundson, Senior Manager, Product Marketing, A10 Networks Recorded: Feb 25 2015 4:00 pm UTC 57 mins
    • Managing a secure SSL environment is getting complex. Recent industry standards and security vulnerabilities required IT to migrate from SHA-1 to SHA-2 hash algorithm, find alternatives for certificates with non-fully-qualified domain (FQDN) names and replace certificates impacted by the Heartbleed vulnerability. In addition, initiatives like Google’s “HTTPS everywhere” or always-on SSL on Google search may increase the deployment of SSL certificates in an organization. All these changes add to the challenges of managing SSL certificates.

      In the meantime, IT managers have to continue to provide optimal system performance to meet their users’ needs while staying within their budget.

      Attend this exclusive webinar to:

      - Discover recent changes and challenges with SSL certificate management
      - Learn how you can minimize time and resources in monitoring and managing SSL certificates with Symantec Certificate Intelligence Center (CIC)
      - Find out how you can optimize the performance of SSL encryption and decryption with the A10 Thunder Application Delivery Controller (ADC) from A10 Networks

      Read more >
    • SSL Traffic - The Cyber Criminal's Best Friend
      SSL Traffic - The Cyber Criminal's Best Friend Darrin Coulson - Blue Coat's VP - Emerging Markets Recorded: Jan 14 2016 4:00 pm UTC 52 mins
    • Combating Advanced Cyber-threats grows more challenging every day. Cyber criminals are cloaking their attacks within Secure Sockets Layer (SSL) traffic, knowing very well that perimeter security devices are blind to their exploits.
      Despite solving the dilemma that all of your network security devices can have the ability to scrutinize SSL traffic with the right tools in place, the issue of maintaining user privacy is the next concern. How can you inspect SSL traffic for threats while maintaining the privacy of employee online banking, healthcare, and shopping transactions?
      Increased SSL usage causes new headaches for IT security. Monitoring and enforcing compliance with internal and external standards for acceptable use of SSL encryption is difficult at best and needs to be able to look at ALL SSL traffic, not just port 443. Implementation of weak encryption keys and sub-par cipher suites often give organizations a false sense of security.
      This workshop will provid Decision Makers and Security Practitioners with the knowledge to equip existing security devices to inspect SSL traffic and maintain high performance capabilities, while maintaining user privacy and enforcing SSL-usage standards, with a common criteria certified device.
      Don’t miss this opportunity to learn more.

      Read more >
    • Unsichere SSL-Konfigurationen aufdecken und korrigieren
      Unsichere SSL-Konfigurationen aufdecken und korrigieren Wolfgang Kandek, Chief Technical Officer Recorded: May 18 2015 1:00 pm UTC 62 mins
    • Als Sicherheitsspezialist sind Sie ständig auf der Hut vor externen Bedrohungen. Die heutige dynamische, komplexe Infrastruktur führt aber auch zu vielen internen Sicherheitsverletzungen aufgrund falscher Konfiguration von IT-Ressourcen, wie etwa SSL. Um zu einem sichereren Umgang mit diesem Verschlüsselungsprotokoll beizutragen, hat Qualys das Forschungsprojekt SSL Labs ins Leben gerufen, das zwei Hauptprobleme im Sicherheits-Ökosystem angehen will: fehlende Tools und fehlende Dokumentation. Besuchen Sie einen neuen Webcast von Qualys, um sich über den aktuellen Stand der SSL-Verschlüsselung zu informieren und zu erfahren, was gegen die gravierenden Probleme getan werden kann. Verpassen Sie nicht diese wichtigen aktuellen Informationen zu SSL, die Ihnen Ressourcen und entscheidende Schritte zur Erhöhung Ihrer Sicherheit aufzeigen.

      Read more >
    • Navigating Upcoming SSL Security Changes
      Navigating Upcoming SSL Security Changes Nick Savvides, Senior Principal Systems Engineer (Security) Recorded: Jun 25 2015 3:30 am UTC 53 mins
    • Australia June 25th 1.30 pm
      New Zealand June 25th 3.30 pm
      Singapore June 25th 11.30 am
      Shanghai June 25th 11.30 am
      Taiwan June 25th 11.30 am
      Hong Kong June 25th 11.30 am

      To protect yourself, your network and your business, you must understand the big picture. Please join us for this webinar in which we’ll prepare you for the upcoming changes in SSL certificate security.

      Most importantly, learn how you can minimize the negative impact of Google's SHA-1 deprecation plan on your business, in addition to other important security news.

      What we’ll cover:

      1) Google's SHA-1 deprecation plan for December 2015
      2) CA/B Forum Baseline Requirements, Non-FQDN & gTLD changes
      3) Security threats that you should be on the lookout for

      Read more >